摘要 |
method for authenticating and protecting data, comprising the providing of a plurality of challenging mines dispersed within an executable program file, each mine being dependent on one validation key located in at least one other mine, and optionally on additional keys, for allowing proper use of the executable program file and content files that can be activated by said executable program file.
|